An organization has issued metal keys to its employees and has recently suffered some after hours employee thefts. The organization should consider acquiring:

a. PIN pads
b. Guards
c. A key card entry system
d. Mantraps


c. A key card entry system

Computer Science & Information Technology

You might also like to view...

_________ are used to control how users enter data into a field in order to maintain consistency with data entry

A) Indexed fields B) Required fields C) Input masks D) AutoComplete features

Computer Science & Information Technology

To open the Address Book while creating a new e-mail message, click the ____ button in the Message window.

A. Send B. Date C. To D. From

Computer Science & Information Technology

PTR records can only be created manually when A or AAAA records are added to the forward lookup zone file

Indicate whether the statement is true or false

Computer Science & Information Technology

Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

a. Distributed denial-of-service b. Smishing c. Logic bomb d. Phishing

Computer Science & Information Technology